Language Selection

English French German Italian Portuguese Spanish

'Real ID' Act Could Help ID Thieves

Filed under
Security

Security experts have expressed dismay about new legislation that will usher in the nation's first national ID system-citing a lack of confidence in the government's ability to employ the technology in such a way as to prevent citizens from being preyed upon by identity thieves.

The Real ID Act of 2005, added on to the $82 billion Emergency Supplemental Appropriations bill, was passed by the House of Representatives on Thursday and is expected to be passed by the Senate next week.

The act was pushed through without hearings or deliberation, over the objections of a coalition of 12 Democratic senators who decried it as a sweeping anti-immigration bill.

Beyond issues of civil liberties, what's disturbing about the imminent passage of the Real ID Act from a technological point of view is that it's being done in spite of the growing popularity of state RMVs (Registries of Motor Vehicles) as targets for identity thieves, experts say.

"My feeling is there's a tremendous amount of activity going on right now around data theft," said Jon Oltsik, an analyst with Enterprise Strategies Group. "The stuff we hear about in the news is dwarfed by the stuff we don't hear about, because people bury it, because they don't want to disclose it. They're praying nothing happens."

The bill dictates that all states collect, at a minimum, personal information from citizens in order to obtain a driver's license, including name, date of birth, gender, driver's license or identification card number, digital photograph, address and signature.

Whereas collection of this particular information is not new, the linkage of states' databases is. The bill specifies that states link what are at present discrete databases, creating, in effect, one nationwide database with personal information pertaining to all citizens.

Even with states' currently discrete, disconnected databases, thieves increasingly have turned their attention to RMVs.

In March, thieves rammed a car through the back wall of a DMV near Las Vegas and stole computer equipment containing personal information on more than 8,900 people. Police in the past month have arrested DMV examiners in Florida and Maryland for selling fake driver's licenses.

Meanwhile, personal information for thousands of Americans has been compromised through the recent rash of scandals around what were considered secure databases residing with data brokers ChoicePoint and Lexis Nexis.

Full Story.

More in Tux Machines

Today in Techrights

today's leftovers

  • Key Question: Is Bundling Proper?
    In both cases, bundling is either a restraint of trade or simply a wasted motion. You don’t paint a house green only to paint it red if you have any sense. The right way to do IT is to make your choice and buy/acquire what you need to accomplish your goals in the most efficient manner possible. Bundling exclusively That Other OS with all PCs was only good for an illegal monopolist and its “partners” in crime. This is not about denying businesses profits. It’s about competition in the market and freedom for users/buyers to have choice.
  • Dell Gets An Airplane Mode Switch Driver In Linux 4.2
  • Call for hosts for GUADEC 2016
    GUADEC is the biggest gathering of GNOME users and developers, which takes place in Europe every year. It includes conference days, the GNOME Foundation annual general meeting and hacking in a week of coding and discussion.
  • 4MLinux 13.0 Screencast and Screenshots
  • Tumbleweed is rolling again
    Opensuse Tumbleweed has been static since the 20150612 snapshot. But today the 20150630 snapshot was released. We are moving again.
  • openSUSE Tumbleweed net-tools vs net-tools-deprecated
  • PostgreSQL 9.5 in Debian
    The package is also waiting in NEW to be accepted for Debian experimental.
  • DUCK challenge at DebConf15
  • Upgrades to Jessie, Ruby 2.2 transition, and chef update
    Last month I started to track all the small Debian-related things that I do. My initial motivation was to be concious about how often I spend short periods of time working on Debian. Sometimes it’s during lunch breaks, weekends, first thing in the morning before regular work, after I am done for the day with regular work, or even during regular work, since I do have the chance of doing Debian work as part of my regular work occasionally. Now that I have this information, I need to do something with it. So this is probably the first of monthly updates I will post about my Debian work. Hopefully it won’t be the last.
  • Avalue debuts Braswellian COMs and an SBC
    Avalue unveiled three Linux-friendly embedded boards based on Intel’s 14nm Braswell SoCs: a Qseven COM, a COM Express Type 6 COM, and a 5.25-inch SBC.
  • Tizen In-App Purchases(IAP) for Unity Applications goes Live!
  • 5 Best Enterprise Apps and Extensions for Google Chrome
    We have already covered a lot of enterprise applications on our site before. However, one would never expect apps in this genre to exist on a browser like Google Chrome. But, nothing could be further from the real truth. Google's effort to outsmart even the biggest players in the enterprise market are gradually paying off. Slowly spreading its wings into the business world, Google is venturing into arenas where Microsoft once reigned supreme. While the competition doesn't concern us much, but what has happened, in effect, is that the rivalry is bringing out the best in both companies.
  • Platform9 Aims to Control the Private Cloud from the Cloud [Video]
  • Teaching Email Self-Defense: Campaigns intern leads a workshop at PorcFest
    My workshop on Email Self-Defense took place at the 12th annual Porcupine Freedom Festival in Lancaster, New Hampshire. Around eight people attended, which was a few more than I expected. Christopher Waid and Bob Call of ThinkPenguin joined me in helping everyone who brought a laptop to set up GnuPG properly. Those who didn't bring a laptop participated by observing the process on the system most similar to their own and asking questions about particular steps, so as to enable them to achieve the same configuration when they returned home.
  • Security advisories for Thursday

Leftovers: Software

today's howtos